COMPLETE SOLUTIONS
All of the following are common or likely motivations for a hacker EXCEPT ___?
1. Ego boost
2. Social validation
3. College credit
4. Challenge
5. Adventure - ANSWER-College credit
Which of the following potential hackers represents the greatest threat because they
likely already have physical and logical access to a target?
1. Consultant
2. Competitor
3. Overseas black hat for hire
4. Customer
5. Recreational hackers under 16 years of age - ANSWER-Consultant
Which of the following is NOT a significant threat to availability?
1. Natural disasters
2. hardware failure
3. Accidental spills
4. Stateful inspection filtering
5. Lack of proper training - ANSWER-Stateful inspection filtering
Which of the following is NOT a potential consequence of a malware infestation?
1. Corruption of data
2. Leaking of confidential information
3. Crashing of systems
4. Identity theft
5. Improved throughput - ANSWER-Improved throughput
What is the primary difference in network security between a wired connection and a
wireless connection to a private LAN?
1. Inability to access all network resources
2. Lack of realistic throughput
3. Needing to be inside the building to access the network
4. Ability to support encrypted sessions
5. Support for multi-factor authentication - ANSWER-Needing to be inside the
building to access the network
Most exploits are based on the existence of which?